CVE-2007-6013

critical

Description

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

References

https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html

https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html

https://exchange.xforce.ibmcloud.com/vulnerabilities/38578

http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt

Details

Source: Mitre, NVD

Published: 2007-11-19

Updated: 2024-02-09

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical